Survey of Vehicular Cloud Netwok (VCN) - Architecture, Operations, Threats and Security

Authors(4) :-I. Mumthaj Begam, Anisha Montina, Madhuvanthi, R. Suganya

Vehicular Ad-hoc Networks (VANET) is that the unit of measurement of thelargest reality application of circumstantial networks where nodes space unitrepresented via quick paced vehicles. This paper introduces thefuture rising technology, i.e., conveyance Cloud Networking(VCN) where vehicles and adjacent infrastructure merge withtraditional internet clouds to produce altogether completely different applications move from low sized application to really difficult applications.VCN consists of three forms of clouds: conveyance cloud, Infrastructure cloud and Ancient Back-End (IT) cloud. we tend to introduced these clouds via a three tier style onwith their operations and characteristics. we have planned use cases of each cloud tier that designate but it's a lot of created and utilised whereas taking the conveyance quality thoughtlessness. Moreover, it's crucial to substantiate security, privacy and trust of VCN network and its assets. Therefore, to clarify the safety of VCN, we have provided associate full analysis of various threats related to each tier of VCN. The threats connected to conveyance cloud and infrastructure cloud unit of measurement classified in step with their assets, i.e., vehicles, adjacent infrastructure, wireless communication, conveyance messages, and conveyance cloud threats. Similarly, the Back-End cloud threats unit of measurement classified into data and network threats. The implications of thosethreats and their effects on varied components of VCN square measure explained fine.

Authors and Affiliations

I. Mumthaj Begam
Department of CSE, Raak College of Engineering and Technology, Pondicherry, Tamil Nadu, India
Anisha Montina
Department of CSE, Raak College of Engineering and Technology, Pondicherry, Tamil Nadu, India
Madhuvanthi
Department of CSE, Raak College of Engineering and Technology, Pondicherry, Tamil Nadu, India
R. Suganya
Assistant Professor, Department of CSE, Raak College of Engineering and Technology, Pondicherry, Tamil Nadu, India

Vehicular Ad-hoc Networks, Cloud Networking, Ancient Back-End, vehicle-to-infrastructure, vehicle-to-vehicle, RSU

  1. Peter Mell, Timothy Grance. The NIST Definition of Cloud Computing (Draft). NIST. 2011.
  2. Cloud Computing-The complete cornerstone guide to cloud computing best practices.pp-18.
  3. Rajkumar Buyya , Chee Shin Yeo , Srikumar Venugopal, James Broberg , Ivona Brandic, Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility, Future Generation Computer Systems, Elsevier,2008.
  4. Jeremy Geelan. Twenty one experts define cloud computing. virtualization, August 2008. Electronic Magazine, article available at http://virtualization.sys con.com/node/612375.
  5. Luis M. Vaquero , Luis Rodero Merino , Juan Caceres , Maik Lindner: A Break in the Clouds: Towards a Cloud Definition. ACM SIGCOMM Computer Communication Review. Vol 39, Jan 2009.
  6. Anthony T. Velte, Toby J. Velte, Robert Elsenpeter : Cloud Computing-A Practical Approach. McGraw-Hill.
  7. A white paper produced by the Cloud Computing Use Case Discussion Group Cloud Computing Use Cases. Version 3.0, February 2010.
  8. Introduction to Cloud Computing. https://www.priv.gc.ca/resource/fsfi/02_05_d_51_cc_e.pdf.
  9. Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy H. Katz, Andrew Konwinski,  unho Lee, David A. Patterson, Ariel Rabkin, Ion Stoica, Matei Zaharia: Above the Clouds: A Berkeley View of Cloud Computing.

Publication Details

Published in : Volume 3 | Issue 1 | January-February 2018
Date of Publication : 2018-02-28
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 892-896
Manuscript Number : CSEIT183110
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

I. Mumthaj Begam, Anisha Montina, Madhuvanthi, R. Suganya, "Survey of Vehicular Cloud Netwok (VCN) - Architecture, Operations, Threats and Security", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.892-896 , January-February-2018.
Journal URL : http://ijsrcseit.com/CSEIT183110

Article Preview

Follow Us

Contact Us